Q1M1 - E-Tech
Q1M1 - E-Tech
QUARTER 1 – MODULE 1
INTRODUCTION
This module was carefully developed and reviewed by us teachers of MCTI – Montessori College of Technology Inc. to
clarify and discuss thoroughly each subject. The purpose of this module is to understand the importance of each concept intended to
meet the need and contribute to the development and knowledge in each student. Students are expected to achieve the goals of the
new education program in the guidance of this module.
INTRODUCTORY MESSAGE:
To the parent: This module is designed to meet the current needs of your children under present condition (pandemic). As
partners to the learning process of your children, we the teachers is humbly requesting you to please assist us under your close
supervision for their development hence this module is prepared by.
To the students: This module is prepared and intended to increase your knowledge and help you in your studies. It will also
help you to expand your knowledge and learn the concepts related to this subject. Since we are under the crisis (pandemic) this
module is prepared by for you our dear students for your self-study at home under the guidance and supervision of your honest and
devoted parent of guardian.
Course Description:
This course deals with the information and communication technologies as a tool for curating, contextualizing,
collaborating, and creating content and experiences for learning in the professional tracks.
Learning Outcome(s): At the end of the lesson, the learner will be able to;
1. improve their knowledge on how ICT affects everyday lives and the state of our nation;
2. compare and contrast the difference between online platforms, site and content;
3. understand the features of Web 2.0, understand the future of the World Wide Web through
Web 3.0;
4. learn the different trends in ICT and use them to their advantage; and
5. know and determine how to avoid the dangers of the internet.
Lesson 1
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGIES
DISCUSSION:
Information and Communication Technology (ICT) deals with the use of different communication technologies such as mobile
phones, telephone, Internet, etc. to locate, save, send and edit information. ICT plays an integral part in the development of the
Philippine economy. The Philippines is dubbed as the “ICT Hub of Asia”.
KEY TERMS
Web 1.0 – Static web page – a page that has content that the user cannot manipulate.
Web 2.0 – Dynamic web page – a page where its content depend on the user or the website visitor.
Web 3.0 – a concept of the World Wide Web that is designed to cater to the individual user.
TRENDS IN ICT
1. Convergence – technological convergence Is the synergy of technological advancements to work on a similar goal or task.
2. Social Media – is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and
exchange user-generated content. There are six types of social media:
a. Social Network – These are sites that allow you to connect with other people with the same interests or
background.
b. Bookmarking Sites – these are sites that allow you to store and manage links to various websites and resources.
c. Social News – these are sites that allow users to post their own news items or links to other news sources.
d. Media Sharing – these are sites that allow you to upload the share media content like images, music, and video.
e. Microblogging – these are sites that focus on short updates from the user.
f. Blogs and Forums – these websites allow users to post their content.
3. Mobile Technologies – the popularity of smartphones and tablets has taken a major rise over the years. Several devices are
capable of using high-speed internet. Different operating systems used in mobiles devices are:
a. iOS – used in Apple devices such as the iPhone and iPad.
b. Android – an open source operating system developed by Google. Being open source means several mobile phone
companies use this OS for free.
c. Blackberry OS – used in Blackberry devices.
d. Windows Phone OS – a closed source and proprietary operating system developed by Microsoft.
e. Symbian – the original smartphone OS; used by Nokia devices.
f. WebOS – originally used for smartphones; now used for smart TVs.
g. Windows Mobile – developed by Microsoft for smartphones and pocket PCs.
4. Assistive Media – is a nonprofit service designed to help people who have visual and reading impairments.
Lesson 2
RULES OF NETIQUETTE
The Internet is defined as the information superhighway. This means that anyone has access to this highway, can place
information, and can grab that information. Any information, even things that you have set privately, can be accessed one way or
another.
Tips to Stay Safe Online
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions, read it.
3. Check out the privacy policy page of a website to learn how the website handles the information you share.
4. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be
able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/WIFI.
7. Do not talk to strangers whether online or face – to – face.
8. Never post anything about a future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one anti-virus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Internet Threats
Here are some of the threats you should be away of when using the Internet:
1. Malware – stands for malicious software.
Malware (a portmanteau of malicious software)[1] is any software intentionally designed to cause disruption to a computer,
server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access
to information, or which unknowingly interferes with the user's computer security and privacy.
-Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, logic bombs,
ransomware, spyware, adware, rogue software, wipers and keyloggers).
a. Virus – a malicious program designed to replicate itself and transfer from one computer to another either through
the Internet and local networks or data storage like flash drives and CDs.
-a type of malware that spreads from one computer to another, causing damage to software and data. Viruses can
corrupt or delete data, alter software programs, or gain access to sensitive information.
Here are some ways viruses can spread:
-Email attachments: Viruses can be disguised as attachments to emails that look like funny images, greeting
cards, or audio and video files.
-Downloads: Viruses can be hidden in pirated software or other files or programs downloaded from the
internet.
-Instant messaging: Viruses can spread through instant messaging messages.
b. Worm – a malicious program that transfers from one computer to another by any type of means.
-A computer worm is a type of malware that can automatically propagate or self-replicate without human
interaction, enabling its spread to other computers across a network. A worm often uses the victim organization’s
internet or a local area network (LAN) connection to spread itself.
The "love virus" is a nickname for the ILOVEYOU computer worm, which was a major malware outbreak in 2000:
What it was
ILOVEYOU was a self-replicating worm that spread through email attachments that appeared to be love letters or other
harmless files. The worm would infect a user's computer, steal passwords, and disrupt information.
How it worked
-The email subject line was "ILOVEYOU" and the attachment was "LOVE-LETTER-FOR-YOU.TXT.vbs". The attachment
was a Visual Basic script that would:
-Overwrite random files, including Office files and image files
-Hide MP3 files instead of deleting them
-Copy itself to all addresses in the user's Windows Address Book
Who created it.
Onel de Guzman, a 24-year-old computer science student at the AMA Computer College in the Philippines
-Worms spread from computer to computer and can move and operate independently. A worm’s ability to send out
hundreds or thousands of copies of itself is one of its biggest dangers.
-Viruses are almost always attached to an executable file and remain dormant until the victim activates the attack,
either by opening an infected application, downloading a corrupt file, or clicking a link. Viruses cannot spread without
human action.
-Trojan horses are a type of malware that disguise themselves as legitimate code. Attackers can export files, modify
data, and delete files on your device. Generally, Trojan horses do not attempt to inject themselves into other files or
otherwise propagate themselves.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed, leaves your
PC unprotected and allows hackers to get your information.
*Rogue security software – trick the user into posing that it is a security software. It asks the user to pay to
improve his/her security but in reality, they are not protected at all.
-Rogue security software is a type of malicious software that tricks users into thinking their computer is infected
with a virus or malware. The goal of this software is to convince users to buy and install harmful software that can
compromise the security of their system.
-Rogue security software is a form of scareware and ransomware. Some examples of rogue security software
include: SpySheriff, Nava Shield, XPAntivirus/AntivirusXP, and ErrorSafe.
d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to
monitor what you currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke done by the users. This is done to steal their password or any other
sensitive information. It can record email, messages, or any information you type using your keyboard.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
-spam is a term for unsolicited messages that are sent in bulk to a large number of recipients. Spam
can appear in many forms, including email, blogs, and wikis. It's usually sent for commercial purposes, such as advertising,
phishing, or spreading malware.
Spam can be a security risk because it may contain malicious links that can exploit systems or gather
personal information. Here are some tips for identifying and avoiding spam:
Be wary of links
-Don't click any links in a suspicious message, even if it says "unsubscribe". Clicking on a link signals to the spammer that you
saw the message, which can lead to more spam.
Check for grammatical errors
-Legitimate messages from companies are unlikely to have poor grammar, spelling mistakes, or lots of punctuation errors.
Be skeptical of offers that sound too good to be true
-Phishing messages often offer something for free, like cash or a desirable prize.
Use anti-malware software
-This can help scan files you download for malware.
Report spam
-You can report unsolicited emails, texts, or calls to a consumer protection or privacy regulator.
3. Phishing – its goal is to acquire sensitive personal information like passwords and credit card details.
*Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.
Copyright Infringement
If you create something – an idea, invention, a form of literary work, or a research, you have the right as to how it should be
used by others. This is called intellectual property. In other words, the copyright law includes your rights over your work, and anyone
who uses it without your consent is punishable by law.
Online Research
The information that we need is more likely already in the Internet. It is just a matter of how to look for it and how to use
information from the most credible source. Here are some tips in conducting online research:
1. Have a question in mind. Focus on a question that you want answered.
2. Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for
you.
3. Advanced Search. The best way to filter information you get from the search engines is by using the advanced search. This
will allow you to filter out information you do not need.
4. Look for a credible source. Some wikis, though filled with updated information, are not a credible source. This is due to the
fact that anyone can edit its content.
5. Give credit. If you are going to use the information from a source for educational purposes, give credit to the original
author of the page or information.
EMPOWERMENT TECHNOLOGIES
QUARTER 1 – MODULE 1
Test II. Matching Type: Match Column A with Column B. Write the letter of the correct answer on the space
provided before each number.
A B
e 1. virus a. designed to send you advertisements
l 2. rogue b. sends an official – looking email and is designated to steal
sensitive
o 3. keylogger personal information
a 4. adware c. a provision that allows you to use copyright work without
consent with
i 5. spam certain limitations
b 6. phishing d. a browser feature that is synonymous to “private” browsing
c 7. fair use e. replicates and can transfer from one computer to another
h 8. spyware f. exploits the DNS system
n 9. private g. states that anyone who uses your work without your consent is
m 10. malware punishable by law
d 11. incognito h. runs in the background and monitors what you are doing
k 12. internet i. unwanted email mostly from bots
j 13. Trojan j. disguised as a useful program but is not
g 14. copyright k. the information superhighway
f 15. pharming l. tricks the user into posing that it is a security software
m. a malicious software
n. an option to hide a post so that search engines could not scan it
o. used to record the keystrokes done by the user
Test III. Essay. Read and understand carefully each question. Write YES if you agree with the statement and NO
if you disagree. Defend your answer.
1. You and your best friend play a lot of video games. One time, he/she asks for your password so he/she
can help you level up and get in-game money. He/she promises to keep your password a secret. Is it
okay to give away your password?
2. Your computer has an antivirus. Is it okay with you to open most email attachments like e-cards and
video files?
3. You received an email stating that your father’s bank account is going to be forfeited if you do not
respond to the email. Is it safe to reply?